Exam 251-260 Flashcards
Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?
A. Switch
B. Proxy Server
C. Router
D. VPN Concetnrator
A. Switch
Which of the following provides the MOST protection against zero day attacks via email attachments?
A. Anti-spam
B. Anti-virus
C. Host-based firewalls
D. Patch management
A. Anti-spam
An organization recently installed a firewall on the network. Employees must have access to their work computer from
their home computer. In which of the following ways should the firewall be configured?
A. Allow TCP port 3389 outbound
B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound
D. Allow TCP port 3389 inbound
Which of the following is an IPv6 address?
A. 00:14:38:05:7B:E5
B. 10.10.1.1
C. 192.168.1.1
D. 2001:cdba::3257:9652
D. 2001:cdba::3257:9652
Which of the following would Sandy, a technician, find in a network map?
A. QoS standards
B. MDF/IDFs
C. System logs
D. Firewall rules
B. MDF/IDFs
Which of the following uses eight groups of characters for addressing?
A. MAC
B. IPv4
C. IPv6
D. DHCP
C. IPv6
Which of the following routing protocols relies on hop count as its ONLY metric?
A. BGP
B. EIGRP
C. OSPF
D. RIP
D. RIP
Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious
activities?
A. XSS
B. SQL injection
C. Directory traversal
D. Packet sniffing
D. Packet sniffing
Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following interfaces on
the router will be modified?
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0
A. FastEthernet 0/0
Which of the following has a maximum transfer rate Mbps and operates at the 5GHz frequency?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A. 802.11a